You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-troubleshoot.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,14 @@ description: Learn how to troubleshoot common issues with Azure Load Balancer.
4
4
services: load-balancer
5
5
documentationcenter: na
6
6
author: mbender-ms
7
-
manager: dcscontentpm
8
-
ms.custom: seodoc18
7
+
manager: kumudD
9
8
ms.service: load-balancer
10
9
ms.topic: troubleshooting
11
10
ms.tgt_pltfrm: na
12
11
ms.workload: infrastructure-services
13
-
ms.date: 01/28/2020
12
+
ms.date: 12/05/2022
14
13
ms.author: mbender
14
+
ms.custom: FY23 content-maintenance
15
15
---
16
16
17
17
# Troubleshoot Azure Load Balancer
@@ -23,42 +23,42 @@ When the Load Balancer connectivity is unavailable, the most common symptoms are
23
23
- VMs behind the Load Balancer aren't responding to health probes
24
24
- VMs behind the Load Balancer aren't responding to the traffic on the configured port
25
25
26
-
When the external clients to the backend VMs go through the load balancer, the IP address of the clients will be used for the communication. Make sure the IP address of the clients are added into the NSG allow list.
26
+
When the external clients to the backend VMs go through the load balancer, the IP address of the clients will be used for the communication. Make sure the IP address of the clients are added into the NSG allowlist.
27
27
28
28
## No outbound connectivity from Standard internal Load Balancers (ILB)
29
29
30
30
**Validation and resolution**
31
31
32
-
Standard ILBs are **secure by default**. Basic ILBs allowed connecting to the internet via a *hidden* Public IP address called the default outbound access IP. This isn't recommended for production workloads as the IP address is neither static nor locked down via NSGs that you own. If you recently moved from a Basic ILB to a Standard ILB, you should create a Public IP explicitly via [Outbound only](egress-only.md) configuration, which locks down the IP via NSGs. You can also use a [NAT Gateway](../virtual-network/nat-gateway/nat-overview.md) on your subnet. NAT Gateway is the recommended solution for outbound.
32
+
Standard ILBs are **secure by default**. Basic ILBs allowed connecting to the internet via a *hidden* Public IP address called the default outbound access IP. This isn't recommended for production workloads as the IP address isn't static or locked down via network security groups that you own. If you recently moved from a Basic ILB to a Standard ILB, you should create a Public IP explicitly via [Outbound only](egress-only.md) configuration, which locks down the IP via network security groups. You can also use a [NAT Gateway](../virtual-network/nat-gateway/nat-overview.md) on your subnet. NAT Gateway is the recommended solution for outbound.
33
33
34
-
## Can't change backend port for existing LB rule of a load balancer that has virtual machine scale set deployed in the backend pool.
34
+
## Can't change backend port for existing LB rule of a load balancer that has Virtual Machine Scale Set deployed in the backend pool.
35
35
36
-
### Cause: The backend port cannot be modified for a load balancing rule that's used by a health probe for load balancer referenced by virtual machine scale set
36
+
### Cause: The backend port can't be modified for a load balancing rule that's used by a health probe for load balancer referenced by Virtual Machine Scale Set
37
37
38
38
**Resolution**
39
-
In order to change the port, you can remove the health probe by updating the virtual machine scale set, update the port and then configure the health probe again.
39
+
In order to change the port, you can remove the health probe by updating the Virtual Machine Scale Set, update the port and then configure the health probe again.
40
40
41
41
## Small traffic is still going through load balancer after removing VMs from backend pool of the load balancer.
42
42
43
43
### Cause: VMs removed from backend pool should no longer receive traffic. The small amount of network traffic could be related to storage, DNS, and other functions within Azure.
44
44
45
-
To verify, you can conduct a network trace. The FQDN used for your blob storage accounts are listed within the properties of each storage account. From a virtual machine within your Azure subscription, you can perform nslookup to determine the Azure IP assigned to that storage account.
45
+
To verify, you can conduct a network trace. The Fully Qualified Domain Name (FQDN) used for your blob storage account is listed within the properties of each storage account. From a virtual machine within your Azure subscription, you can perform `nslookup` to determine the Azure IP assigned to that storage account.
46
46
47
47
## Additional network captures
48
48
49
49
If you decide to open a support case, collect the following information for a quicker resolution. Choose a single backend VM to perform the following tests:
50
50
51
-
- Use ps ping from one of the backend VMs within the VNet to test the probe port response (example: ps ping 10.0.0.4:3389) and record results.
51
+
- Use `ps ping` from one of the backend VMs within the VNet to test the probe port response (example: ps ping 10.0.0.4:3389) and record results.
52
52
- If no response is received in these ping tests, run a simultaneous Netsh trace on the backend VM and the VNet test VM while you run PsPing then stop the Netsh trace.
53
53
54
54
## Load Balancer in failed state
55
55
56
56
**Resolution**
57
57
58
58
- Once you identify the resource that is in a failed state, go to [Azure Resource Explorer](https://resources.azure.com/) and identify the resource in this state.
59
-
- Update the toggle on the right-hand top corner to Read/Write.
60
-
-Click on Edit for the resource in failed state.
61
-
-Click on PUT followed by GET to ensure the provisioning state was updated to Succeeded.
59
+
- Update the toggle on the right-hand top corner to **Read/Write**.
60
+
-Select **Edit** for the resource in failed state.
61
+
-Select **PUT** followed by **GET** to ensure the provisioning state was updated to Succeeded.
62
62
- You can then proceed with other actions as the resource is out of failed state.
0 commit comments